Security Policies and Trust in Ubiquitous Computing

Authors: , Tim Finin, Lalana Kagal, Jim Parker, Anand Patwardhan

Book Title: Philosophical Transactions of the Royal Society A

Date:

Abstract: Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artifacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.

Type: Article

Tags: policy, privacy, security, trust, ubiquitous computing

Google Scholar: search

Attachments:

530.pdfdownloads: 1138

Publications
Log in